1. Huang, Y., Negrete, J., Wagener, J., Fralick, C., Rodriguez, A., Peterson, E., & Wosotowsky, A. (2022). Graph neural networks and cross-protocol analysis for detecting malicious IP addresses. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-022-00838-y
2. Shahraki, A., Abbasi, M., Taherkordi, A., & Jurcut, A. D. (2022). A comparative study on online machine learning techniques for network traffic streams analysis. Computer Networks, 207, 108836. https://doi.org/10.1016/j.comnet.2022.108836
3. Moura, G.C.M., Sadre, R., & Pras, A. (2014). Internet bad neighborhoods temporal behavior. In 2014 IEEE network operations and management symposium (NOMS) (pp. 1–9). https://doi.org/10.1109/NOMS.2014.6838306
4. Wu, Y., Wei, D., & Feng, J. (2020). Network attacks detection methods based on deep learning techniques: A survey. Security and Communication Networks, 2020, 1–17.
5. Lu, J., Liu, A., Dong, F., Gu, F., Gama, J., & Zhang, G. (2018). Learning under concept drift: A review. IEEE Transactions on Knowledge and Data Engineering, 31(12), 2346–2363.